Abstract:
The present disclosure is directed toward systems and methods for managing electronic documents. For example, systems and methods described herein can enable parties to an agreement outlined in an electronic document to add, track, and save electronic signatures associated with the electronic document. Furthermore, systems and methods described herein automatically identify expiration information associated with the electronic document and generate alerts for the electronic document based on the expiration information.
Abstract:
An electronic signature comprises an authenticated audio and/or visual recording of a spoken assent that conforms to a pre-established phrase. Alternatively, an electronic signature comprises an authenticated visual recording of a series of physical gestures that conforms to a pre-established sequence. Rules are established with respect to how the assent is to be recorded and authenticated. These rules, as well as the document itself, are provided to a document recipient. If the document recipient assents to the document, an audio and/or visual recording of the assent is generated. Location information that defines or approximates the geographical location where the document recipient recorded the assent is also optionally recorded as well. Once recorded, the assent can be authenticated using any of a variety of suitable authentication processes. An authenticated assent can be considered a legally binding electronic signature that forms a part of, or is otherwise associated with, the document.
Abstract:
In various implementations, an electronic signature platform implements an electronic signing workflow that includes receiving, from a signer device, annotations made by a signer role to an electronic document in response to a request to sign the electronic document. A reply is received, from an advisor device, is made by an advisor role and is responsive to the annotations. Based on providing the reply to the signer device, an electronic signature is received that is provided by the signer role in response to the request to sign the electronic document. An audit trail is maintained that includes descriptions for events associated with the electronic signature, and timestamps associated with the events. The annotations and the reply are recorded by one or more of the events.
Abstract:
Improved document processing workflows provide a secure electronic signature framework by reducing attack vectors that could be used to gain unauthorized access to digital assets. In one embodiment an electronically signed document is removed from an electronic signature server after signed copies of the document are distributed to all signatories. The electronic signature server optionally retains an encrypted copy of the signed document, but does not retain the decryption password. This limits the amount of data retained by the electronic signature server, making it a less attractive target for hackers. However, the electronic signature server still maintains audit data that can be used to identify a signed document and validate an electronic signature. For example, a hash of the document (or other document metadata) can be used to validate the authenticity of an electronically signed document based on a logical association between an electronic signature and the signed document.
Abstract:
A document originator establishes rules for authenticating an electronic signature. Such rules may require that any user who wishes to assent to the document terms provide biometric data in the form of an ocular image. In one implementation, such rules, as well as the document itself, are provided to a document recipient. If the document recipient assents to the document, an electronic signature is acquired from the document recipient, along with the required ocular image. The image is acquired using an infrared-enabled camera in the case of an iris image, or a retinal scanner in the case of a retina image. The acquired image can be authenticated by comparison to a trusted reference image, for example which may have been obtained from the document recipient during an initial registration process. If the comparison matches with a sufficiently high degree of confidence, then the electronic signature is considered authentic.
Abstract:
A computer implemented method and apparatus for acquiring sentiment analysis information based on user reactions to displayable content. The method comprises receiving reaction data of at least one individual user viewing portions of displayable content, wherein the reaction data of each user includes indications representative of at least one of a time-varying emotional state of the user and a time-varying level of interest of the user captured during viewing of the displayable content; and performing sentiment analysis on the reaction data by at least one of: categorizing portions of the displayable content based on one of the reaction of one user or aggregated reactions of a plurality of users, and identifying at least one portion of the displayable content having one of a more favorable and a less favorable reaction by the at least one user, by comparison to one of a baseline and reactions to other portions of the displayable content.
Abstract:
Improved document processing workflows provide a secure electronic signature framework by reducing attack vectors that could be used to gain unauthorized access to digital assets. In one embodiment an electronically signed document is removed from an electronic signature server after signed copies of the document are distributed to all signatories. The electronic signature server optionally retains an encrypted copy of the signed document, but does not retain the decryption password. This limits the amount of data retained by the electronic signature server, making it a less attractive target for hackers. However, the electronic signature server still maintains audit data that can be used to identify a signed document and validate an electronic signature. For example, a hash of the document (or other document metadata) can be used to validate the authenticity of an electronically signed document based on a logical association between an electronic signature and the signed document.
Abstract:
An electronic signature comprises an authenticated audio and/or visual recording of a spoken assent that conforms to a pre-established phrase. Alternatively, an electronic signature comprises an authenticated visual recording of a series of physical gestures that conforms to a pre-established sequence. Rules are established with respect to how the assent is to be recorded and authenticated. These rules, as well as the document itself, are provided to a document recipient. If the document recipient assents to the document, an audio and/or visual recording of the assent is generated. Location information that defines or approximates the geographical location where the document recipient recorded the assent is also optionally recorded as well. Once recorded, the assent can be authenticated using any of a variety of suitable authentication processes. An authenticated assent can be considered a legally binding electronic signature that forms a part of, or is otherwise associated with, the document.
Abstract:
Video character-based content targeting is described. In one or more embodiments, users make selections of characters in video content in conjunction with playback of the video content. For example, a user is prompted during playback of video content to select a character in the video content that the user likes. An indication is received of selections made by the user of one or more characters, each of which is associated with information that describes a degree to which the character exhibits a plurality of personality attributes. Once received, the user's selections of the one or more characters from the video content are analyzed. In particular, the selections are analyzed to ascertain a degree to which the user identifies with the plurality of personality attributes. The degree to which the user is determined to identify with the plurality of personality attributes is then used to control communication of content to the user.
Abstract:
A computer implemented method and apparatus for avoiding license storming during an unplanned regional blackout. The method comprises generating a leaf license for each geographic region of a plurality of geographic regions in a broadcast area, wherein each leaf license includes a first content encryption key for decrypting media content associated with the leaf license, and where each leaf license is bound to a root license for each geographic region in the plurality of geographic regions; and generating, in response to a blackout event, a new leaf license for each geographic region of the plurality of geographic regions that are located outside of a blackout area, wherein each new leaf license includes a second content encryption key different from the first content encryption key for decrypting protected media content, and wherein each new leaf license remains bound to the root license for each geographic region in the plurality of geographic regions.